An evaluation of clustering technique over intrusion detection system

Data mining has been popularly recognized as an important way to mine useful information from large volumes of data that are noisy, fuzzy & random. Intrusion detection has become an efficient tool against network attack because they allow network administrator to detect vulnerability. Existing IDS techniques includes high false positive and false negative rate. Data mining using IDS reduces the number of false alarm rate. So, here some of the clustering algorithms like k means, hierarchical and Fuzzy C Means have been implemented to analyze the detection rate over KDD CUP 99 dataset. Based on evaluation result, FCM outperforms in terms of both accuracy and computational time.

[1]  Zhong-Yang Xiong,et al.  Distributed intrusion detection based on clustering , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[2]  N. B. Anuar,et al.  Identifying False Alarm for Network Intrusion Detection System Using Hybrid Data Mining and Decision Tree , 2008 .

[3]  James C. Bezdek,et al.  Extending fuzzy and probabilistic clustering to very large data sets , 2006, Comput. Stat. Data Anal..

[4]  Hui Wang,et al.  A clustering-based method for unsupervised intrusion detections , 2006, Pattern Recognit. Lett..

[5]  International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, Mysore, India, August 22-25, 2013 , 2013, ICACCI.

[6]  Ujjwal Maulik,et al.  Performance Evaluation of Some Clustering Algorithms and Validity Indices , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  Vipin Kumar,et al.  Chameleon: Hierarchical Clustering Using Dynamic Modeling , 1999, Computer.

[8]  Taher Niknam,et al.  An Efficient Hybrid Evolutionary Algorithm for Cluster Analysis , 2008 .

[9]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[10]  Salvatore J. Stolfo,et al.  Real time data mining-based intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[11]  S. Sathya Bama,et al.  Network Intrusion Detection using Clustering: A Data Mining Approach , 2011 .

[12]  Taeshik Shon,et al.  A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..